Products overview

OUR SECURITY ANALYSIS PLATFORMS

WHAT PRODUCTS DO WE PROVIDE

OUR PLATFORMS

Nowadays the security of an embedded application relies on a set of security layers. This covers typically the following aspects:

The way a code has been structured and the sensitive data have been made inaccessible

The use of potential security resources offered by the device

The implementation of sensitive operations such as the cryptographic operations

The additional security features using software techniques, such as obfuscations (data, symbols) or dynamic controls (anti-debug, anti-tampering, device binding)

An adequate security implementation is likely to exploit an adequate combination of the above techniques. When considering the security of an application, the security layers have to be targeted specifically. This requires having the right tool set giving the ability to explore the strengths and weaknesses of the implementation and detect whether a product and solution can be compromised.

They aim at covering the various and sophisticated techniques that could compromise a product or a solution. eshard builds flexible and easy-to-use software tools to enable you to test the security of your product or implementation yourself. Our products are web-based and compiled into separate product lines.

esChecker: a web-based analysis tool to review binary code, without the need for in-depth knowledge. With one click of a button, ou can reveal the binary, and get a better understanding of the vulnerabilities within the code.

ANALYSE YOUR PRODUCT

Check the vulnerabilities to better understand the risk.

REGISTER POTENTIAL THREATS

When you understand the weaknesses, you are capable of knowing how to withstand them.